Source: securityaffairs.co

Operation Roman Holiday – Hunting the Russian APT28

Operation Roman Holiday – Hunting the Russian APT28

Why Banning Risks to Cybersecurity Doesn’t Actually Improve Cybersecurity

Why Banning Risks to Cybersecurity Doesn’t Actually Improve Cybersecurity

Crooks leverage obfuscated Coinhive shortlink in a large crypto-mining operation

Crooks leverage obfuscated Coinhive shortlink in a large crypto-mining operation

Bitcoin Malware Found Keeping an Eye on 2.3 Million Bitcoin Addresses

Bitcoin Malware Found Keeping an Eye on 2.3 Million Bitcoin Addresses

Zerodium offers up to $500,000 for Linux Zero-Day exploits

Zerodium offers up to $500,000 for Linux Zero-Day exploits

A new variant of Ursnif Banking Trojan served by the Necurs botnet hits Italy

A new variant of Ursnif Banking Trojan served by the Necurs botnet hits Italy

Vulnerabilities in Fredi Wi-Fi baby monitor can be exploited to use it a spy cam

Vulnerabilities in Fredi Wi-Fi baby monitor can be exploited to use it a spy cam

6 Security Flaws in Smart Speakers You Need to Know About

6 Security Flaws in Smart Speakers You Need to Know About

Magento credit card stealer Reinfector allows reinfect sites with malicious code

Magento credit card stealer Reinfector allows reinfect sites with malicious code

ClipboardWalletHijacker miner hijacks your Ether and Bitcoin transaction, over 300,000 computers have been infected

ClipboardWalletHijacker miner hijacks your Ether and Bitcoin transaction, over 300,000 computers have been infected

Satori botnet is back again, experts observed a surge in port scan activity associated with it

Satori botnet is back again, experts observed a surge in port scan activity associated with it

Search Engines in Russia cannot link to banned VPN services and Internet proxy services

Search Engines in Russia cannot link to banned VPN services and Internet proxy services

How Threat Hunters Operate in Modern Security Environments

How Threat Hunters Operate in Modern Security Environments

EOS Node Remote Code Execution Vulnerability

EOS Node Remote Code Execution Vulnerability

MalHide Malware uses the compromised system as an eMail relay

MalHide Malware uses the compromised system as an eMail relay

Electron Windows Protocol Handler MITM/RCE

Electron Windows Protocol Handler MITM/RCE